CEH v11: Network Scanning, TCP, Host Discovery & Port/Service Scanning
Ethical Hacker v11
| Intermediate
- 5 Videos | 57m 12s
- Includes Assessment
- Earns a Badge
An ethical hacker can be most effective when employing the right tools for the job. In this course, you'll learn about networking scanning types and the various flags used in TCP communication. Next, you'll explore commonly used network scanning tools used by many of today's security professionals. You'll then move on to learn about tools that can be used for host discovery, common methods of implementation, and even some countermeasures for prevention purposes. Finally, you'll examine the differences between port and service scans, their use cases, and common port/service associations. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
-
recognize the purpose of the different types of scansrecognize the phases of the TCP three-way handshakeidentify the different TCP flagsrecognize scanning tools that allow you to craft custom packetsidentify scanning tools that can run on mobile devices
-
recognize the different nmap optionsrecognize host discovery tools that have a GUI interfacerecognize how to perform host discovery with nmaprecognize how to perform a port and service scan with nmap
IN THIS COURSE
-
1.Network Scanning Types8m 56s
-
2.TCP Communication11m 13s
-
3.Network Scanning Tools13m 10s
-
4.Host Discovery15m 6s
-
5.Port and Service Scanning8m 48s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE

COURSE
CEH v11: Nmap TCP Scans